bMighty bSecure: SMB Security On A Budget - And On Demand! - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Applications
Commentary
4/30/2009
03:20 PM
Fredric Paul
Fredric Paul
Commentary
50%
50%

bMighty bSecure: SMB Security On A Budget - And On Demand!

When times get tough, it's all too tempting to push security concerns aside. But that's a fool's game. Fortunately, there are ways for small and midsize companies to address security issues without breaking the bank. To learn more, check out the On-Demand version of bMighty bSecure, which brings together business and security experts to show you how to do exactly that.

When times get tough, it's all too tempting to push security concerns aside. But that's a fool's game. Fortunately, there are ways for small and midsize companies to address security issues without breaking the bank. To learn more, check out the On-Demand version of bMighty bSecure, which brings together business and security experts to show you how to do exactly that.bMighty bSecure comprises a full day of inspiring and informative presentations, networkingin engaging and life-like Virtual Event environment available right from your desktop. Plus, in the on-demand version, you can access transcripts of all the interactions in the Networking Lounge and exhibitor booths.

The keynote session on Cost-Effective Security Strategies, includes security expert Trey Ford from White Hat Security; Forrester Research's Jonathan Penn, author of The State Of SMB IT Security: 2008 To 2009; and Leigh McMullen from international consultancy Sogeti, who explains how his mid-market clients are facing their security issues.

Tim Wilson from bMighty sister site Dark Reading leads a session on the The 5 Most Common Sources Of SMB Security Breaches -- And How To Prevent Them. Tim is joined by Keith Jones from Jones Dykstra & Associates; Nick Akerman from the law firm of Dorsey & Whitney LLP, and Mike Fratto of InformationWeek's Network Computing Labs.

Perhaps my favorite panel covers Security Appliances, the hot new approach to making security easy. I'm joined by Phil Hochmuth from research house Yankee Group; security expert Andrew Braunberg from Current Analysis; and Russ Hedgpeth, ex-police officer and CEO of Unity Electronics, a mid-market company actually using a security appliance! This panel is entertaining on point, clearly laying out the key strengths and issues around Unified Threat Management (UTM).

And because true security also means being able to recover from problems, bMighty security blogger Keith Ferrell moderates a Disaster Recovery panel on how to make sure your business is ready to survive the worst. Keith's panel includes Howard Marks from Networks Are Our Lives, who has written on this topic for bMighty; Rob Ayoub from Frost & Sullivan; and Glen Slater, Director of IT at Clinical Financial Services (learn more about how this small business uses "big-boy" disaster recovery technology to gain the trust of enterprise clients).

Oh, and bMighty editor Benjamin Tomkins introduces a Fiberlink Platinum Sponsor Presentation: Protecting Data on Laptops: What You Need to Know; How to Control Costs. Find out what threats to mobile data should concern you, how to set priorities for mobile security, and much more.

Click here to meet our illustrious roster of speakers.

Check it out Now!

bMighty bSecure is totally free to attendees, thanks to our roster of cutting-edge sponsors, including Platinum Sponsors thawte and Fiberlink as well as Silver sponsors ArcSight, Netgear, MessageLabs, and i365.

bmighty_header_650

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
Enterprise Guide to Edge Computing
Cathleen Gagne, Managing Editor, InformationWeek,  10/15/2019
News
Rethinking IT: Tech Investments that Drive Business Growth
Jessica Davis, Senior Editor, Enterprise Apps,  10/3/2019
Slideshows
IT Careers: 12 Job Skills in Demand for 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/1/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Slideshows
Flash Poll